US6832336B2 - Method and apparatus for maintaining consistent data - Google Patents
Method and apparatus for maintaining consistent data Download PDFInfo
- Publication number
- US6832336B2 US6832336B2 US09/873,039 US87303901A US6832336B2 US 6832336 B2 US6832336 B2 US 6832336B2 US 87303901 A US87303901 A US 87303901A US 6832336 B2 US6832336 B2 US 6832336B2
- Authority
- US
- United States
- Prior art keywords
- memory
- commands
- command
- control card
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/20—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
- G06F11/2053—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
- G06F11/2056—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant by mirroring
- G06F11/2071—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant by mirroring using a plurality of controllers
- G06F11/2076—Synchronous techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/20—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
- G06F11/2053—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
- G06F11/2056—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant by mirroring
- G06F11/2064—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant by mirroring while ensuring consistency
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99951—File or database maintenance
- Y10S707/99952—Coherency, e.g. same view to multiple users
- Y10S707/99953—Recoverability
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99951—File or database maintenance
- Y10S707/99952—Coherency, e.g. same view to multiple users
- Y10S707/99955—Archiving or backup
Definitions
- the invention relates to the field of communications. More specifically, the invention relates to communication networks.
- Control card redundancy improves reliability of network elements. Having a secondary control card with the same information as the primary control cards enables a network element to withstand hardware and/or software failure on the primary card. In addition, the secondary control card enables maintenance of network elements. The primary control card can be pulled for repairs or testing because the secondary control card will take over operations.
- This prior art technique has the disadvantage of exposing the network element to disruption. A failure may occur before information is copied to the secondary control card. When the secondary control card takes over operation of the network element, the secondary control card will be lacking information. The network administrator will have to discover the inconsistencies and correct these inconsistencies. In addition, the inconsistencies may cause service to be disrupted to a customer.
- FIG. 1 is a diagram of a network element according to one embodiment of the invention.
- FIG. 2 is a diagram of the memory 109 and the memory 107 of FIG. 1 according to one embodiment of the invention.
- FIG. 3 is a diagram of a configuration manager interacting with the memory 107 and 109 of FIG. 1 according to one embodiment of the invention.
- FIG. 4 is a flowchart for storing information to backup memory according to one embodiment of the invention.
- FIG. 1 is a diagram of a network element according to one embodiment of the invention.
- a network element 102 includes two control cards 103 and 105 and an interface 101 . Examples of a network element include routers, switches, bridges, edge devices, etc.
- the control card 103 is connected to the control card 105 .
- the control card 103 includes a processor 113 and a memory 109 .
- the control card 105 also includes a processor 111 and a memory 107 .
- one of the control cards 103 , 105 is designated as the primary control card while the other is the secondary control card. If the primary control card fails then the secondary control card operates in place of the primary control card.
- Both of the control cards 103 , 105 are connected to an interface 101 .
- the interface receives input from a user. Although the interface is shown as part of the network element, the interface can be a remote terminal in another embodiment of the invention.
- This input is sent from the interface to the primary control card.
- the control card 103 is the primary control card, then the interface 101 transmits configurations, data, etc. to the control card 103 .
- information stored on the primary control card is duplicated on the secondary control card.
- the control card 103 transmits information received from the interface 101 to the control card 105 before storing the information in its memory 109 .
- the control card 105 receives information (configurations, network data, etc.) from the control card 103 and writes the information to its memory 107 . Before information is written to the memory 107 , the information is written to the memory 109 .
- global mapping is implemented in the network element 102 .
- Global mapping provides a unique address for hardware throughout the network element.
- the control card 103 can modify the memory 109 directly.
- the control card 105 can modify the memory 107 directly.
- FIG. 2 is a diagram of the memory 109 and the memory 107 of FIG. 1 according to one embodiment of the invention.
- a dashed line 205 indicates a region 201 of the memory 107 being mapped to a region 203 of the memory 109 .
- the memory management process will associate addresses of the region 201 to addresses of the region 203 .
- all of the memory 107 is mapped to the memory 109 .
- FIG. 3 is a diagram of a configuration manager interacting with the memory 107 and 109 of FIG. 1 according to one embodiment of the invention.
- a configuration manager 301 receives configurations and processes the configurations.
- the configuration manager breaks down a configuration into a component or components and determines if a write, update or delete operation or operations is required.
- the configuration manager 301 requests a write for write and update operations and a delete for delete operations.
- the request from the configuration manager 301 corresponds to an address in the memory 109 , assuming the memory 109 is being used by the primary control card.
- an exception causes the operation to be performed on a corresponding address in the memory 107 as indicated by the dashed line 303 .
- FIG. 4 is a flowchart for maintaining consistency of data between local and remote memory according to one embodiment of the invention.
- remote memory is mapped. It is assumed that local memory is on the primary control card and remote memory is on the secondary control card.
- local memory is marked with a flag that will cause an exception.
- local memory has read-only permission until a command is successfully performed on remote memory. In such an embodiment, once local memory is modified, read-only permission is reinstated.
- configuration(s) are received from the interface 101 of FIG. 1 .
- the configuration manager 301 of FIG. 3 processes the configurations.
- the configuration manager 301 submits modification requests (i.e., write or delete operations) corresponding to the processed configurations.
- the submitted modification request(s) for local memory trigger an exception(s).
- this exception is spawned by the operating system when attempts are made to modify given areas of local memory.
- given locations of local memory are associated with given exceptions. For example, referring to FIG. 2, a write command is generated for the area 203 of the local memory 109 .
- the exception spawned by the request to write to the area 203 is associated to the area 201 of the remote memory 107 .
- a write or delete is only allowed on local memory once remote memory is modified. Otherwise, read-only permission is enforced on local memory.
- the exception(s) modifies the remote memory in accordance with the requests (i.e., data is written or removed from the remote memory).
- the exception are software interrupts. In another embodiment of the invention, these exceptions are hardware interrupts.
- Insuring data is written or deleted from a secondary memory of a secondary control card before being written or deleted from a primary memory of a primary control card avoids inconsistency of data between control cards. If an error occurs with the control card before the data is written to the primary memory, then the secondary control card has the most recent version of data or configurations. If the data is not written to the secondary memory, then the primary and secondary control cards still have the same information.
- the embodiments herein of the invention at the lowest level, such as with kernel exceptions, provides a simple backup mechanism with high performance. The complications of higher level backup applications are avoided.
- the secondary control card can take control immediately.
- the network element 102 includes line cards in addition to the control cards 103 and 105 .
- Line cards in the network element 102 and the control cards 103 and 105 include memories, processors, and/or Application Specific Integrated Circuit (“ASICs”).
- ASICs Application Specific Integrated Circuit
- Such memories and the memories 107 and 109 include a machine-readable medium on which is stored a set of instructions (i.e., software) embodying any one, or all, of the methodologies described herein.
- Software can reside, completely or at least partially, within this memory and/or within the processor and/or ASICs.
- the term “machine-readable medium” shall be taken to include any mechanism that provides (i.e., stores and/or transmits) information in a form readable by a machine (e.g., a computer).
- a machine-readable medium includes read only memory (“ROM”), random access memory (“RAM”), magnetic disk storage media, optical storage media, flash memory devices, electrical, optical, acoustical, or other form of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.), etc.
- ROM read only memory
- RAM random access memory
- magnetic disk storage media magnetic disk storage media
- optical storage media flash memory devices
- electrical, optical, acoustical, or other form of propagated signals e.g., carrier waves, infrared signals, digital signals, etc.
Abstract
Description
Claims (46)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/873,039 US6832336B2 (en) | 2001-06-02 | 2001-06-02 | Method and apparatus for maintaining consistent data |
PCT/US2002/015321 WO2002099641A1 (en) | 2001-06-02 | 2002-05-14 | Method and apparatus for maintaining consistent data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/873,039 US6832336B2 (en) | 2001-06-02 | 2001-06-02 | Method and apparatus for maintaining consistent data |
Publications (2)
Publication Number | Publication Date |
---|---|
US20020184572A1 US20020184572A1 (en) | 2002-12-05 |
US6832336B2 true US6832336B2 (en) | 2004-12-14 |
Family
ID=25360870
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/873,039 Expired - Lifetime US6832336B2 (en) | 2001-06-02 | 2001-06-02 | Method and apparatus for maintaining consistent data |
Country Status (2)
Country | Link |
---|---|
US (1) | US6832336B2 (en) |
WO (1) | WO2002099641A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6941487B1 (en) * | 2002-03-07 | 2005-09-06 | Riverstone Networks, Inc. | Method, system, and computer program product for providing failure protection in a network node |
US7430735B1 (en) * | 2002-05-07 | 2008-09-30 | Lucent Technologies Inc. | Method, system, and computer program product for providing a software upgrade in a network node |
US8402454B2 (en) | 2010-09-22 | 2013-03-19 | Telefonaktiebolaget L M Ericsson (Publ) | In-service software upgrade on cards of virtual partition of network element that includes directing traffic away from cards of virtual partition |
US8402453B2 (en) | 2010-09-22 | 2013-03-19 | Telefonaktiebolaget L M Ericsson (Publ) | In-service software upgrade of control and line cards of network element |
US8885562B2 (en) | 2012-03-28 | 2014-11-11 | Telefonaktiebolaget L M Ericsson (Publ) | Inter-chassis redundancy with coordinated traffic direction |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6832336B2 (en) | 2001-06-02 | 2004-12-14 | Redback Networks Inc. | Method and apparatus for maintaining consistent data |
US7139817B1 (en) * | 2001-06-12 | 2006-11-21 | Network Appliance, Inc. | Managing configuration information for multiple devices |
US10749954B2 (en) * | 2016-12-20 | 2020-08-18 | Futurewei Technologies, Inc. | Cross-data center hierarchical consensus scheme with geo-aware leader election |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5574922A (en) | 1994-06-17 | 1996-11-12 | Apple Computer, Inc. | Processor with sequences of processor instructions for locked memory updates |
US5801938A (en) | 1994-10-03 | 1998-09-01 | Nasser Kalantery | Data processing method and apparatus for parallel discrete event simulation |
US5825782A (en) * | 1996-01-22 | 1998-10-20 | Micron Technology, Inc. | Non-volatile memory system including apparatus for testing memory elements by writing and verifying data patterns |
US5909574A (en) * | 1997-12-23 | 1999-06-01 | Northern Telecom Limited | Computing system with exception handler and method of handling exceptions in a computing system |
US5954829A (en) * | 1996-12-30 | 1999-09-21 | Mci Communications Corporation | System, method, and computer program product for digital cross connect testing |
US6094530A (en) * | 1998-04-29 | 2000-07-25 | Intel Corporation | Remotely monitoring execution of a program |
WO2002099641A1 (en) | 2001-06-02 | 2002-12-12 | Redback Networks Inc. | Method and apparatus for maintaining consistent data |
US6611848B1 (en) * | 2000-09-13 | 2003-08-26 | Radiant Data Corporation | Methods for maintaining data and attribute coherency in instances of sharable files |
US6662282B2 (en) * | 2001-04-17 | 2003-12-09 | Hewlett-Packard Development Company, L.P. | Unified data sets distributed over multiple I/O-device arrays |
-
2001
- 2001-06-02 US US09/873,039 patent/US6832336B2/en not_active Expired - Lifetime
-
2002
- 2002-05-14 WO PCT/US2002/015321 patent/WO2002099641A1/en not_active Application Discontinuation
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5574922A (en) | 1994-06-17 | 1996-11-12 | Apple Computer, Inc. | Processor with sequences of processor instructions for locked memory updates |
US5801938A (en) | 1994-10-03 | 1998-09-01 | Nasser Kalantery | Data processing method and apparatus for parallel discrete event simulation |
US5825782A (en) * | 1996-01-22 | 1998-10-20 | Micron Technology, Inc. | Non-volatile memory system including apparatus for testing memory elements by writing and verifying data patterns |
US5954829A (en) * | 1996-12-30 | 1999-09-21 | Mci Communications Corporation | System, method, and computer program product for digital cross connect testing |
US5909574A (en) * | 1997-12-23 | 1999-06-01 | Northern Telecom Limited | Computing system with exception handler and method of handling exceptions in a computing system |
US6094530A (en) * | 1998-04-29 | 2000-07-25 | Intel Corporation | Remotely monitoring execution of a program |
US6611848B1 (en) * | 2000-09-13 | 2003-08-26 | Radiant Data Corporation | Methods for maintaining data and attribute coherency in instances of sharable files |
US6662282B2 (en) * | 2001-04-17 | 2003-12-09 | Hewlett-Packard Development Company, L.P. | Unified data sets distributed over multiple I/O-device arrays |
WO2002099641A1 (en) | 2001-06-02 | 2002-12-12 | Redback Networks Inc. | Method and apparatus for maintaining consistent data |
Non-Patent Citations (3)
Title |
---|
Datta, A., "Databases for Active, Rapidly, Changing Data Systems (ARCS) and Handling Sensor Data in such Systems," IEEE TSE Paper No. L618, pp. 1-39, Apr. 7, 1996. |
Datta, A., et al., "Providing Real-Time Response, State Regency and Temporal Consistency in Databases for Rapidly Changing Environments," pp. 1-34, May 16, 1996. |
Xiong, M., et al., "Scheduling Acess to Temporal Data in Real-Time Databases," chapter 1, pp. 1-25, Department of Computer Science, University of Massachusetts, 1997. |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6941487B1 (en) * | 2002-03-07 | 2005-09-06 | Riverstone Networks, Inc. | Method, system, and computer program product for providing failure protection in a network node |
US7430735B1 (en) * | 2002-05-07 | 2008-09-30 | Lucent Technologies Inc. | Method, system, and computer program product for providing a software upgrade in a network node |
US8402454B2 (en) | 2010-09-22 | 2013-03-19 | Telefonaktiebolaget L M Ericsson (Publ) | In-service software upgrade on cards of virtual partition of network element that includes directing traffic away from cards of virtual partition |
US8402453B2 (en) | 2010-09-22 | 2013-03-19 | Telefonaktiebolaget L M Ericsson (Publ) | In-service software upgrade of control and line cards of network element |
US8885562B2 (en) | 2012-03-28 | 2014-11-11 | Telefonaktiebolaget L M Ericsson (Publ) | Inter-chassis redundancy with coordinated traffic direction |
Also Published As
Publication number | Publication date |
---|---|
US20020184572A1 (en) | 2002-12-05 |
WO2002099641A1 (en) | 2002-12-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20110283274A1 (en) | Firmware image update and management | |
EP1617328A2 (en) | Modular BIOS update mechanism | |
US7716522B2 (en) | Information processing system and method for executing process during communication error | |
US20020194532A1 (en) | Communication control device and control method | |
US6832336B2 (en) | Method and apparatus for maintaining consistent data | |
US5901311A (en) | Access key protection for computer system data | |
US9330153B2 (en) | System, method, and computer readable medium that coordinates between devices using exchange of log files | |
JP3189903B2 (en) | Device with capability saving / restoring mechanism | |
CN112486814A (en) | System migration test method, migration test system, device and storage medium | |
US7222338B2 (en) | Method for upgrading data | |
CN110008681A (en) | Access control method, equipment and system | |
CN113076248B (en) | Application processing method, device and equipment and readable storage medium | |
CN112860595B (en) | PCI (peripheral component interconnect express) equipment or PCIE (peripheral component interconnect express) equipment, data access method and related assembly | |
JP2003058435A (en) | Service control application execution method and system | |
JP2001154896A (en) | Computer and method for updating file | |
CN113127110A (en) | Transaction service control method, device, equipment and storage medium | |
WO2000034871A1 (en) | Computer, recorded medium on which address validity checking program is recorded, and address validity checking method | |
JP3589433B2 (en) | Database guarantee method | |
CN114025013B (en) | Information processing method, device and equipment | |
CN113986855B (en) | Method, system, equipment and medium for locking files by network file system | |
JPH09237182A (en) | Communication equipment | |
KR100211585B1 (en) | Method for data recovery for data consistency in pcs system | |
JPH10187523A (en) | Method and system for sharing terminal information for loosely coupled system | |
CN115022167A (en) | Method and system for controlling home gateway service flow | |
CN115168008A (en) | Database dynamic switching method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: REDBACK NETWORKS INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LAL, SANJAY;REEL/FRAME:012178/0689 Effective date: 20010805 |
|
AS | Assignment |
Owner name: SILICON VALLEY BANK, CALIFORNIA Free format text: SECURITY AGREEMENT;ASSIGNOR:REDBACK NETWORKS INC.;REEL/FRAME:014499/0957 Effective date: 20040310 Owner name: SILICON VALLEY BANK,CALIFORNIA Free format text: SECURITY AGREEMENT;ASSIGNOR:REDBACK NETWORKS INC.;REEL/FRAME:014499/0957 Effective date: 20040310 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: REDBACK NETWORKS, INC., CALIFORNIA Free format text: RELEASE;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:018855/0108 Effective date: 20070104 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
REMI | Maintenance fee reminder mailed | ||
AS | Assignment |
Owner name: ERICSSON AB,SWEDEN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:REDBACK NETWORKS INC.;REEL/FRAME:024002/0363 Effective date: 20070125 Owner name: ERICSSON AB, SWEDEN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:REDBACK NETWORKS INC.;REEL/FRAME:024002/0363 Effective date: 20070125 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
FPAY | Fee payment |
Year of fee payment: 12 |